The move to the cloud offers great potential for U.S. Navy information technology efforts. Yet, other aspects such as applications and integrated capability sets must work their way into the sea service cyber realm.
Reductions in defense funding are having a greater effect on the force than simply instilling fiscal belt-tightening. Already strapped for cash, the services are exploring innovative ideas for cost-efficient information technology acquisition.
Instead of deciding where to spend its money, the Pentagon now must decide where not to spend its increasingly scarce cash resources. This entails risk assessment that focuses on how not to hurt the warfighter.
Cyber has provided the means for rapidly assembling and operating military coalitions in the post-Cold-War era. Now, the very nature of the domain may require coalitions to save it from a growing menu of threats. These threats can range from annoying hackers to organized crime to malicious nation-states and even geopolitical movements to restrict the flow of ideas. While the panoply of perils is diverse, the actions to defend against them may have to spring from the well of government and organizational cooperation.
South Korea didn't merely react when it suffered two extensive cyber attacks earlier this year. It established a national cyber policy and formed a government/military/commercial partnership to protect against future intrusions.
The best intentions among international cyber experts may be foiled simply because they don't understand each other's cultural differences. Priorities and even the way of thinking can inhibit progress without cyber experts even realizing it.
The national laws that ensure freedom in modern democracies are preventing effective international cybersecurity measures. Hackers hide behind borders as they ply their malice around the world, and authorities are hard-pressed to reach them.
More than just generational differences characterize today's cyber work force. People of all ages have different ways of thinking and different goals for their profession. The variation is almost as great as the technology changes they are incorporating.
Australia has implemented a cybersecurity policy that brings together government and industry to secure the domain nationally. The country recently elevated cybersecurity as a major priority for national security, and in 2009, it established a Cyber Security Operations Center (CSOC).